Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ClickFix Attack Uses DNS Hijacking to Deploy Malware

ClickFix Attack Uses DNS Hijacking to Deploy Malware

Posted on February 14, 2026 By CWS

A novel variant of the ClickFix social engineering campaign is now leveraging a custom DNS hijacking tactic to propagate malware. This sophisticated attack exploits DNS queries to execute further infection stages, effectively evading conventional detection mechanisms by blending into standard network operations.

How ClickFix Attacks Deceive Users

ClickFix attacks employ deception through fake error alerts, such as counterfeit CAPTCHA challenges or misleading ‘fix this issue’ prompts on compromised web pages. These tactics manipulate users into copying a specific script to their clipboard and executing it via basic system dialogs like the Run command or PowerShell.

While earlier versions like CrashFix used fake browser crashes to create urgency, the latest iteration employs an advanced evasion technique involving the Domain Name System (DNS). This method facilitates the attack’s stealth and efficacy.

The Technical Evade Strategy

Upon execution of the initial harmful command, the script uses cmd.exe to perform a DNS lookup directed at an attacker-controlled server, bypassing the system’s usual internet resolver. The script analyzes this DNS response, specifically extracting data from the Name: field, which contains the code for the subsequent payload stage.

This innovative approach transforms DNS into a lightweight staging environment, enabling attackers to verify target activity before deploying more substantial malware components. Given the ubiquitous nature of DNS traffic in networks, this method effectively conceals malicious actions.

Infection Process and Impact

Microsoft Defender researchers have noted that following the DNS-triggered second stage, the attack sequence downloads a ZIP archive with a portable Python setup. The malicious Python script executes to perform host and domain reconnaissance, ensuring continued access by deploying a VBScript and establishing a shortcut named MonitoringService.lnk in the Windows Startup directory.

The campaign’s final payload is a Remote Access Trojan (RAT) known as ModeloRAT, which is detected and neutralized by Microsoft Defender Antivirus under the threat signature Trojan:Win32/ClickFix.R!ml. This threat highlights the importance of robust cybersecurity measures to counter evolving attack strategies.

Stay updated on the latest cybersecurity news by following us on Google News, LinkedIn, and X. Reach out to feature your stories.

Cyber Security News Tags:Attack, ClickFix, Cybersecurity, DNS, DNS hijacking, Malware, Microsoft Defender, ModeloRAT, network traffic, RAT

Post navigation

Previous Post: Data Breach by Over 300 Chrome Extensions Uncovered
Next Post: AI Pentest Tool Enhances Security Testing with New Features

Related Posts

Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Cyber Security News
North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams Cyber Security News
Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine Cyber Security News
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools Cyber Security News
Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest Cyber Security News
World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Enhances Vertex AI Security After AI Agent Risks Exposed
  • Anthropic’s Claude Code Leak: Human Error Leads to Source Code Exposure
  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Enhances Vertex AI Security After AI Agent Risks Exposed
  • Anthropic’s Claude Code Leak: Human Error Leads to Source Code Exposure
  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark